Self transforming to power law topology for overlay networks.

Slides:



Advertisements
Similar presentations
University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
Advertisements

KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Topologies of Complex Networks Functions vs. Structures Lun Li Advisor: John C. Doyle Co-advisor: Steven H. Low Collaborators: David Alderson (NPS) Walter.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid Rong Jiang
COORDINATION and NETWORKING of GROUPS OF MOBILE AUTONOMOUS AGENTS.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
The Organic Grid: Self- Organizing Computation on a Peer-to-Peer Network Presented by : Xuan Lin.
Distributed Cluster Repair for OceanStore Irena Nadjakova and Arindam Chakrabarti Acknowledgements: Hakim Weatherspoon John Kubiatowicz.
Cascading Behavior in Large Blog Graphs: Patterns and a model offence.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
DIDS part II The Return of dIDS 2/12 CIS GrIDS Graph based intrusion detection system for large networks. Analyzes network activity on networks.
Navigability of Networks Dmitri Krioukov CAIDA/UCSD M. Boguñá, M. Á. Serrano, F. Papadopoulos, M. Kitsak, A. Vahdat, kc claffy May, 2010.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
Optimization Based Modeling of Social Network Yong-Yeol Ahn, Hawoong Jeong.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Prof. A. Taleb-Bendiab, Talk: SOAS’07, Contact: Date: 12/09/2015, Slide: 1 Software Engineering Concerns in Observing Autonomic.
Dr Tina Balke Dr Thomas Centre for Research in Social.
Autonomy-Oriented Mechanisms for Efficient Energy Distribution Presenter: Benyun Shi Principal Supervisor: Prof. Jiming Liu Co-Supervisor: CHEUNG, William.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms Med-Hoc-Net 2002, Chia.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Unifying Dynamical Systems and Complex Networks Theories ~ A Proposal of “Generative Network Automata (GNA)” ~ Unifying Dynamical Systems and Complex Networks.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
NGMAST 2008 A Proactive and Distributed QoS Negotiation Approach for Heterogeneous environments Anis Zouari, Lucian Suciu, Jean Marie Bonnin, and Karine.
Yongqin Gao, Greg Madey Computer Science & Engineering Department University of Notre Dame © Copyright 2002~2003 by Serendip Gao, all rights reserved.
Efficient AOI-Cast for Peer-to-Peer Networked Virtual Environments.
GENI and the Challenges of Network Science Dr. Will E. Leland 4 March 2008.
Measuring Behavioral Trust in Social Networks
Spontaneous Formation of Dynamical Groups in an Adaptive Networked System Li Menghui, Guan Shuguang, Lai Choy-Heng Temasek Laboratories National University.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
A Small World Model for Improving Robustness of Heterogeneous Networks Diansong Luo, Tie Qiu*, Nakema Deonauth, Aoyang Zhao Presenter: Tie Qiu (PhD, Associate.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Hop Optimization and Relay Node Selection in Multi-hop Wireless Ad- hoc Networks Xiaohua (Edward) Li Department of Electrical and Computer Engineering.
Spark on Entropy : A Reliable & Efficient Scheduler for Low-latency Parallel Jobs in Heterogeneous Cloud Huankai Chen PhD Student at University of Kent.
Data Link Layer Architecture for Wireless Sensor Networks Charlie Zhong September 28, 2001.
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
In the name of God.
Routing Protocols to Maximize Battery Efficiency
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Self Healing and Dynamic Construction Framework:
Peer-to-peer networking
Giannis F. Marias, Vassileios Tsetsos,
Outline Introduction Routing in Mobile Ad Hoc Networks
Web *.0 ? Combining peer production and peer-to-peer systems
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
DBA Strategic Road Maps March 2018
Biology: Exploring Life
Internet of Things A Process Calculus Approach
Research Scopes in Complex Network
Coded Caching in Information-Centric Networks
Enhancing Attack Robustness of Scale-free Networks by Camouflage
Presented by Jason L.Y. Lin
Department of Computer Science University of York
CASE − Cognitive Agents for Social Environments
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Submission Title: [Proposal on PAR and 5C draft for BAN]
Evolution for Cooperation
Deterministic and Semantically Organized Network Topology
doc.: IEEE <doc#>
Presentation transcript:

Self transforming to power law topology for overlay networks. Dr. Suyong Eum Copyright ⓒ 2009 OSAKA UNIVERSITY. All rights reserved. Prepared by Dr. Suyong Eum

Background. Proposed method. Simulation results. Conclusions. Presentation Outline Background. Power law topology. Self organization system. Proposed method. Simulation results. Conclusions.

Background – Power law topology? Degree of a node? e.g). (ki): degree k of node i Node degrees over a network are characterized by a distribution function P(k). Robustness & small diameter. P(2) = 4 / 9 P(3) = 4 / 9 P(4) = 1 / 9 1 2 3 P(k) 4 5 6 7 8 9 k

Background - Self organizing system No central control. Emerging global property. No single failure. High Scalability. High Security. Self organizing systems No central control : There is no global control system or global information available. Each subsystem must perform completely autonomously. Emerging structures: The global behavior or functioning of the system emerges in the form of observable patterns or structures. Resulting complexity: Even I the individual subsystems can be simple and perform basic rules, the resulting overall system becomes complex and often unpredictable. High scalability: There is no performance degradation if more subsystems are added to the system. The system should perform as requested, regardless of the number of subsystems.

Background – Needs of future networks Power law topology Low diameter Robustness Self organizing Mechanism Scalability Security Low diameter Robustness Scalability Security Self organizing Power law topology

Proposed method. Step (1) Step (2) i j ki kj (A) (B)

Simulation results - (1). β=0.0 β=0.1 N=1000, E=8000, N^2 times rewiring. β=1.0 7

Simulation results – Robustness (2).

Simulation results – Efficiency (3).

Conclusions A power law topology emerges through the proposed rewiring scheme with the energy function. The proposed evolution model runs in a self-organizing manner, which provides scalability and security for the system. The performances of evolved topologies were evaluated in terms of robustness and efficiency. The former and the latter enhance robustness and efficiency of evolved topologies.

Questions and Problems Thanks for your attention Presenter : Dr. Suyong Eum E-mail : suyong@ist.osaka-u.ac.jp